Which task should you perform in Task Manager before stopping a problematic process for a program that was created by your organization quizlet?
Using Task Manager, you discover an unwanted program that is launched at startup. Of the items listed below, which ones might lead you to the permanent solution to the problem? Which ones would not be an appropriate solution to the problem? Explain why they are not appropriate. Show
a. Look at the registry key that launched the program to help determine where in Windows the program was initiated. b. Use Task Manager to disable the program. c. Search Task Scheduler for the source of the program being launched. d. Use System Configuration to disable the program. e. Search the startup folders for the source of the program. Upgrade to remove ads Only SGD 41.99/year
Review terms and definitions
Focus your studying with a path
Take a practice test
Get faster at matching terms Terms in this set (30)List four ways to start Task Manager. 1. Press Ctrl+Alt+Delete then click Start Task Manager. If a program is not responding, how can you stop it? Press End Task in the Applications Tab of the Task Manager Window If a necessary program is using too much of the system resources and bogging down other applications. What can you do to fix the problem? lower the priority level of the program How can you view a list of users currently logged onto the computer? open the Users tab of the Task Manager What is the program filename and extension of System Configuration? msconfig.exe Which Windows 7 tool can be used to see a history of problems a computer has had since Windows was installed. Windows 7 Reliability Monitor What tool in Windows Vista, used to temporarily disable a startup program, is not available in Windows 7 or Windows XP? Software Explorer If a nonessential service is slowing down startup, how can you permanently disable it? in the Services Console right click the service / click properties / in the Update Service Properties window and at the Startup Type selection window, click the down arrow then select Disabled / then click OK What should be the startup type of a service that should not load at startup but might be used later after startup? What tool can you use to set a service's startup type? Automatic (delayed start) or Manual Start List three snap-ins that can be found in the Computer Management console that are used to manage hardware and track problems with hardware. Task Scheduler What is the file extension of a console that is managed by Microsoft Management Console? .msc Name the program filename and file extension for the Microsoft Management Console. mmc.exe Which log in Event Viewer would you use to find out about attempted logins to a computer? Security log Which log in Event Viewer would you use if you suspect a problem with the hard drive? System log Which three Windows 7 tools are contained in the Vista Reliability and Performance Monitor? Resource Monitor, Reliability Monitor, Performance Monitor What is the path to the Ntuser.dat file in Windows 7? C:\users\username How is the Ntuser.dat file used? It contains user settings. Each time a user logs on, the contents of this file are copied to a location in the registry. Which registry key contains information that the Device Manager uses to display information about hardware? HKLM Which Windows 7/Vista tool can give you a quick report of the overall performance of the system expressed as a single number? Windows Experience Index To improve Windows performance, you decide to disable the indexer used for Windows search. Will Windows search still work? Yes, but not as fast as with indexing. What three indicators in Task Manager can be used to find which program has a memory leak? Memory Private Working Set What key do you press at startup to load the system in Safe Mode? F8 If performance improves when Windows is loaded in Safe Mode, what can you conclude? that a non-essential program is responsible for slowing down the system If performance does not improve when Windows is loaded in Safe Mode, what can you conclude? you can assume the problem is with hardware or Windows settings. When using MSconfig to stop startup services including Microsoft services, which service should you not stop so the restore points will not be lost? System Restore / System Protection System In what folder does Task Scheduler keep scheduled tasks? C:\Windows\System32\Tasks What are the two folders where, by default, Windows stores installed software? Program Files What must you do first before you can delete the program folder containing software that is running in the background? You must close the program and stop the services What is the purpose of the Wow6432Node subkey in the Windows registry? to make it possible for 32-0bit programs to run in a 64-bit Operating System What is the name of the window used to install software in Windows 7/Vista. Programs and Features Recommended textbook solutionsEngineering Electromagnetics8th EditionJohn Buck, William Hayt 483 solutions Introduction to Algorithms3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen 720 solutions Introduction to the Theory of Computation3rd EditionMichael Sipser 389 solutions
Computer Organization and Design MIPS Edition: The Hardware/Software Interface5th EditionDavid A. Patterson, John L. Hennessy 220 solutions Sets with similar termsChapter 4 Optimizing Windows30 terms Gisela_Vallejo Chapter 11Optimiing Windows37 terms Carlotta_Spaulding Chapter 11 Optimizing Windows37 terms lexi_del CIT 1112 - Chapter 11 ( optimizing Window)34 terms lkhchicago Sets found in the same folderChapter 10 Reviewing the Basics / Maintaining Wind…33 terms lawsonb47PLUS CH 1130 terms Jalisha_Harack Chapter 19 Practice - IT Found.31 terms CaptainxKristina Chp 18 Security Strategies65 terms Angel_Andujar Other sets by this creatorWord list 1 Plover entry20 terms lawsonb47PLUS Right Hand Endings18 terms lawsonb47PLUS words needs work 12.25.19185 terms lawsonb47PLUS 543 -643 Words learned30 terms lawsonb47PLUS Verified questionsCOMPUTER SCIENCE Describe how you could obtain a statistical profile of the amount of time spent by a program executing different sections of its code. Discuss the importance of obtaining such a statistical profile. Verified answer
COMPUTER SCIENCE Which of the following scheduling algorithms could result in starvation? a. First-come, first served b. Shortest job first c. Round robin d. Priority Verified answer
COMPUTER SCIENCE What is 4365 - 3412 when these values represent signed 12-bit octal numbers stored in sign-magnitude format? The result should be written in octal. Show your work. Verified answer
COMPUTER SCIENCE Write a program to find the sum of the first n natural numbers, where the value of n is provided by the user. Verified answer Other Quizlet setsA+Guide to Managing and Maintaining Your PC 8th Ed…30 terms Hannah_Glidden ITC-22000 Chapter 1125 terms weisje01 chapter 12 study guide IT25 terms josienasekos Network Ops Unit 11 review test35 terms MoMoney_X Related questionsQUESTION How can you configure the size of the Grid increments used in Grid mode? How can you display or hide the Grid lines in the Edit window? (Configuring the Grid, p184) 2 answers QUESTION This stage performs the POST, initial hardware setup and configuration, and boot device is selected and boot loader is executed. 3 answers QUESTION A GPO component that's an Active Directory object stored in the System\Policies folder. It stores GPO properties and status information but no actual policy settings. 3 answers QUESTION If i-node contains 10 direct addresses of 4 byte and all disk blocks are 1024 KB, what is largest possible file 15 answers Which filesystem feature of Windows Server 2019 allows you to create large volumes that span multiple physical storage devices?Which filesystem feature of Windows Server 2019 allows you to create large volumes that span multiple physical storage devices? Clustering may be used with multiple Windows Server 2019 systems to enhance speed and fault tolerance for network services.
Which of the following VPN authentication methods is considered the most secure quizlet?Which of the following VPN authentication methods is considered the most secure? Extensible Authentication Protocol (EAP) is considered the most secure protocol, followed in order by MS-CHAPv2, CHAP, and PAP. Remote access servers can be configured as RADIUS clients.
What can you configure on a router to protect traffic destined for another network in the organization as it passes over the Internet?What can you configure on a router to protect traffic destined for another network in the organization as it passes over the Internet? The Remote Access role service in Windows Server 2019 provides for DirectAccess and VPN remote access, as well as RADIUS.
Which of the following Windows versions has Microsoft stopped providing support services?Windows 8.1 reached the end of Mainstream Support on January 9, 2018, and will reach end of Extended Support on January 10, 2023.
|